-
CVE-2023-53731
- EPSS 0.05%
- Veröffentlicht 22.10.2025 13:23:59
- Zuletzt bearbeitet 22.10.2025 21:12:48
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
netlink: fix potential deadlock in netlink_set_err()
syzbot reported a possible deadlock in netlink_set_err() [1]
A similar issue was fixed in commit 1d482e666b8e ("netlink: disable IRQs
for netlink_lock_table()") in netlink_lock_table()
This patch adds IRQ safety to netlink_set_err() and __netlink_diag_dump()
which were not covered by cited commit.
[1]
WARNING: possible irq lock inversion dependency detected
6.4.0-rc6-syzkaller-00240-g4e9f0ec38852 #0 Not tainted
syz-executor.2/23011 just changed the state of lock:
ffffffff8e1a7a58 (nl_table_lock){.+.?}-{2:2}, at: netlink_set_err+0x2e/0x3a0 net/netlink/af_netlink.c:1612
but this lock was taken by another, SOFTIRQ-safe lock in the past:
(&local->queue_stop_reason_lock){..-.}-{2:2}
and interrupts could create inverse lock ordering between them.
other info that might help us debug this:
Possible interrupt unsafe locking scenario:
CPU0 CPU1
---- ----
lock(nl_table_lock);
local_irq_disable();
lock(&local->queue_stop_reason_lock);
lock(nl_table_lock);
<Interrupt>
lock(&local->queue_stop_reason_lock);
*** DEADLOCK ***Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c09e8e3f7fd432984bf5422302b093d2371dfc48
Version
82b2ea5f904b3826934df4a00f3b8806272185f6
Status
affected
Version <
4b9adb8d4a62ff7608d4a7d4eb42036a88f30980
Version
59fba11d649854134c75ad88c8adafa9304ac419
Status
affected
Version <
8f6652ed2ad98fe6d13b903483d9257762ab2ec6
Version
21df0c2e7d195de4a3c650de9361b3037fa6c59a
Status
affected
Version <
cde7b90e0539a3b11da377e463dfd2288a162dbf
Version
1d6d43d4805da9b3fa0f5841e8b1083c89868f35
Status
affected
Version <
a641240b7e071c5538dc0e7894ece833fce459dd
Version
1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Status
affected
Version <
61ffe8b1ee084e5c82a4e4bbf9e7b68e0c06e464
Version
1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Status
affected
Version <
eb8e27c8fa9397b4a7b181c48fa58157dbe9902e
Version
1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Status
affected
Version <
1556ba034b95cfd4f75ea93c1a2679ae0444bba1
Version
1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Status
affected
Version <
8d61f926d42045961e6b65191c09e3678d86a9cf
Version
1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Status
affected
Version
5f155c4046200f067b1dc3140ea99ef56e4e0b74
Status
affected
Version
a8e9111a8625dd11e70edd61f7a1ccd26c041442
Status
affected
Version
76cc8e04f38c2bbfcba07f62864a011f142bd40c
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.13
Status
affected
Version <
5.13
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.322
Status
unaffected
Version <=
4.19.*
Version
4.19.291
Status
unaffected
Version <=
5.4.*
Version
5.4.251
Status
unaffected
Version <=
5.10.*
Version
5.10.188
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.3.*
Version
6.3.13
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.144 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|